cybersecurity

cyberao

WASHINGTON: In real-world warfare, troops and tanks maneuver to take advantage of the terrain. In the looking-glass world of cyberspace, however, “maneuver” may mean changing the terrain itself. If the enemy’s invading your country, you can dig a trench or blow a bridge, but otherwise you go to war with the landscape you have. If… Keep reading →

Phoenix Air isolation unit

WASHINGTON: The Pentagon’s Transportation Command — the folks who move most everything for the military from Point A to Point B — are testing a new isolation unit to fit in a C-17 or C-130 aircraft, just 60 days after issuing the requirement. The head of TransCom, Gen. Paul Selva, told reporters this morning at a… Keep reading →

nato-logo

WASHINGTON: NATO is now taking cyber threats as seriously as the Russian tanks and nuclear weapons it was created to deter. But the alliance has a long way to go just to shore up its own network defenses, and it explicitly eschews any role on the offense. NATO has not even written a formal policy… Keep reading →

cybera

The clouds, they are a-changin’. The Defense Information Systems Agency may have lost its status — always controversial and contested — as gatekeeper between the rest of the Defense Department and commercial providers of cloud computing. But Pentagon CIO Terry Halvorsen‘s decision to let other defense entities acquire cloud services on their own still leaves… Keep reading →

The Virginia-class attack submarine USS North Dakota.

FALLS CHURCH, VA: Sure, everyone’s sick of the word “cybersecurity” and endless discussion of “attacks,” Vice Adm. William Hilarides said today, making prominent air quotes with his fingers. Navy submariners in particular, safe beneath the waves, tend to think of cyber as someone else’s problem — but “not so fast,” he told the annual Naval… Keep reading →

Inside an Army electronic warfare testing facility at White Sands.

WASHINGTON: “Electronic warfare is a weapon,” fumed Col. Joe Dupont. But as the Army’s project manager for EW programs — and its recently declassified offensive cyber division — Dupont faces an uphill battle against tight budgets and Army culture to make that case. Whoever rules the airwaves will be able to keep their networks and sensors… Keep reading →

computerscreens

WASHINGTON: Apple, Amazon, and Google long since outstripped the Pentagon in information technology. But as the military and intelligence community try to take advantage of commercial IT innovation, especially in cloud computing, they have run into harsh limits. Security, long-range bandwidth and the sheer volume of data have created problems for the Pentagon that current commercially… Keep reading →

russian-troops-parade-in-st-petersburg

Russia casts a long shadow nowadays, especially if you’re a neighbor. Armed with heavy tanks, jet fighters, long-range missiles, and the world’s slickest state-sponsored cyber-criminals, Russia is a very different threat from the so-called Islamic State, the Taliban, or even China. So how must the US and its NATO allies change gears, mindset and tactics to cope?… Keep reading →

nsa-hq

WASHINGTON: The deputy director of the National Security Agency said today that the Intelligence Community should declassify the existence of more cyber attacks to improve the agency’s ability to mobilize the private sector and to get help when needed. I asked Richard Ledgett at the end of a session at the Intelligence and National Security Summit… Keep reading →

General Sarah Zabel @ AFA 2014

NATIONAL HARBOR: The good news is the Air Force has almost finished a new strategy to protect its high-tech gear from hackers. The bad news? The problem is huge, the processes are nascent, and the intimately interrelated issue of electronic warfare is, at the moment, not part of the discussion. Sure, cybersecurity is the scary,… Keep reading →

Page 1 of 1712345...17